Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
73 | Raylin Tso, Ying Miao 0001, Eiji Okamoto |
A New Algorithm for Searching a Consistent Set of Shares in a Threshold Scheme with Cheaters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers, pp. 377-385, 2003, Springer, 3-540-21376-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
62 | Lein Harn, Changlu Lin |
Detection and identification of cheaters in ( t , n ) secret sharing scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 52(1), pp. 15-24, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 94A62 |
59 | Dick H. J. Epema |
Decay-Usage Scheduling in Multiprocessors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Syst. ![In: ACM Trans. Comput. Syst. 16(4), pp. 367-415, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
decay usage, control, convergence, shares, priorities |
58 | Teruyuki Watanabe, Junzo Watada |
Effective Solution of a Portofolio Selection Based on a Block of Shares by a Meta-controlled Boltzmann Machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES ![In: Knowledge-Based Intelligent Information and Engineering Systems, 8th International Conference, KES 2004, Wellington, New Zealand, September 20-25, 2004. Proceedings. Part III, pp. 129-135, 2004, Springer, 3-540-23205-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
50 | Ching-Sheng Hsu, Shu-Fen Tu, Young-Chang Hou |
An Optimization Model for Visual Cryptography Schemes with Unexpanded Shares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISMIS ![In: Foundations of Intelligent Systems, 16th International Symposium, ISMIS 2006, Bari, Italy, September 27-29, 2006, Proceedings, pp. 58-67, 2006, Springer, 3-540-45764-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Amos Beimel, Noam Livne |
On Matroids and Nonideal Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 54(6), pp. 2626-2643, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
47 | Zhi Zhou, Gonzalo R. Arce, Giovanni Di Crescenzo |
Halftone visual cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Image Process. ![In: IEEE Trans. Image Process. 15(8), pp. 2441-2453, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Rastislav Lukac, Konstantinos N. Plataniotis, Anastasios N. Venetsanopoulos |
A {k, n}-Secret Sharing Scheme for Color Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science ![In: Computational Science - ICCS 2004, 4th International Conference, Kraków, Poland, June 6-9, 2004, Proceedings, Part IV, pp. 72-79, 2004, Springer, 3-540-22129-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
47 | Xiao Long Huang, Brahim Bensaou |
On max-min fairness and scheduling in wireless ad-hoc networks: analytical framework and implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiHoc ![In: Proceedings of the 2nd ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2001, October 4-5, 2001, Long Beach, CA, USA, pp. 221-231, 2001, ACM, 1-58113-428-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
per-link/per-flow fairness, scheduling, ad-hoc networks, distributed algorithms, admission control, max-min fairness |
47 | Benny Chor, Eyal Kushilevitz |
Secret Sharing Over Infinite Domains (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings, pp. 299-306, 1989, Springer, 3-540-97317-6. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
42 | Rabia Sirhindi, Saeed Murtaza, Mehreen Afzal |
Improved Data Hiding Technique for Shares in Extended Visual Secret Sharing Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings, pp. 376-386, 2008, Springer, 978-3-540-88624-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
extended visual secret sharing, LSB encoding, adaptive LSB encoding, data hiding, Visual cryptography |
39 | Wenjing Lou, Wei Liu 0008, Yanchao Zhang, Yuguang Fang |
SPREAD: Improving network security by multipath routing in mobile ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Networks ![In: Wirel. Networks 15(3), pp. 279-294, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Ad hoc networks, Network security, Multipath routing |
39 | Amos Beimel, Noam Livne, Carles Padró |
Matroids Can Be Far from Ideal Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008., pp. 194-212, 2008, Springer, 978-3-540-78523-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Amos Beimel, Noam Livne |
On Matroids and Non-ideal Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings, pp. 482-501, 2006, Springer, 3-540-32731-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Amos Beimel, Benny Chor |
Secret Sharing with Public Reconstruction (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings, pp. 353-366, 1995, Springer, 3-540-60221-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
39 | Hugo Krawczyk |
Secret Sharing Made Short. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings, pp. 136-146, 1993, Springer, 3-540-57766-1. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
37 | Chun-Yu Wang, Ni-Shan Shiao, Hong-Hao Chen, Chwei-Shyong Tsai |
Enhance the visual quality of shares and recovered secret on meaningful shares visual secret sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICUIMC ![In: Proceedings of the 4th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2010, Suwon, Republic of Korea, January 14-15, 2010, pp. 15, 2010, ACM, 978-1-60558-893-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Guofei Gu, Bin B. Zhu, Shipeng Li 0001, Shiyong Zhang |
PLI: A New Framework to Protect Digital Content for P2P Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings, pp. 206-216, 2003, Springer, 3-540-20208-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
digital content protection, Public License Infrastructure (PLI), License Authority (LA), proactive shares update, distributed trust model, secret sharing, intrusion tolerance, Peer-to-Peer (P2P), Digital Rights Management (DRM) |
34 | Jia Yu 0003, Fanyu Kong, Rong Hao, Xuliang Li 0001 |
How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI Workshops ![In: Intelligence and Security Informatics, IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings, pp. 138-148, 2008, Springer, 978-3-540-69136-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
digital signature, forward security, bilinear maps, Computation Diffie-Hellman problem |
34 | Josh Cohen Benaloh |
Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '86, Santa Barbara, California, USA, 1986, Proceedings, pp. 251-260, 1986, Springer. The full citation details ...](Pics/full.jpeg) |
1986 |
DBLP DOI BibTeX RDF |
|
31 | Hiroki Koga |
Coding Theorems on the Threshold Scheme for a General Source. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 54(6), pp. 2658-2677, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Ronghua Shi, Yanhua Yan |
Protection against Mobile Adversaries in Mobile Ad-hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 2026-2031, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Virgilijus Sakalauskas, Dalia Kriksciuniene |
The Impact of Taxes on Intra-week Stock Return Seasonality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCS (2) ![In: Computational Science - ICCS 2008, 8th International Conference, Kraków, Poland, June 23-25, 2008, Proceedings, Part II, pp. 504-513, 2008, Springer, 978-3-540-69386-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
stock return, day-of-the-week effect, seasonality, operation taxes, trading strategy |
31 | Stefan Dziembowski, Krzysztof Pietrzak |
Intrusion-Resilient Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOCS ![In: 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2007), October 20-23, 2007, Providence, RI, USA, Proceedings, pp. 227-237, 2007, IEEE Computer Society, 978-0-7695-3010-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Li Bai |
A Reliable (k, n) Image Secret Sharing Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASC ![In: Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September - 1 October 2006, Indianapolis, Indiana, USA, pp. 31-36, 2006, IEEE Computer Society, 0-7695-2539-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
matrix projection, image processing, secret sharing |
31 | Ronald Cramer, Ivan Damgård, Yuval Ishai |
Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings, pp. 342-362, 2005, Springer, 3-540-24573-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Kevin M. Greenan, Mark W. Storer, Ethan L. Miller, Carlos Maltzahn |
POTSHARDS : Storing Data for the Long-term Without Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Security in Storage Workshop ![In: 3rd International IEEE Security in Storage Workshop (SISW 2005), December 13, 2005, San Francisco, California, USA, pp. 12-20, 2005, IEEE Computer Society, 0-7695-2537-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Data Security, Distributed Storage, Secure Storage, Survivable Storage |
31 | Chin-Chen Chang 0001, Tai-Xing Yu |
Sharing a Secret Gray Image in Multiple Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CW ![In: 1st International Symposium on Cyber Worlds (CW 2002), 6-8 November 2002, Tokyo, Japan, pp. 230-240, 2002, IEEE Computer Society, 0-7695-1862-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
secret sharing, Visual cryptography |
31 | Josef Pieprzyk, Xian-Mo Zhang |
Cheating Prevention in Secret Sharing over GF(pt). ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings, pp. 79-90, 2001, Springer, 3-540-43010-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Nonlinear Secret Sharing, Cheating Immunity, Secret Sharing |
31 | Dick H. J. Epema |
An Analysis of Decay-Usage Scheduling in Multiprocessors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS ![In: Proceedings of the 1995 ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems, Ottawa, Canada, May 15-19, 1995, pp. 74-85, 1995, ACM, 0-89791-695-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
31 | Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung |
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings, pp. 339-352, 1995, Springer, 3-540-60221-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
28 | Daphne Lopez, S. V. Kasmir Raja |
Virtual Time Fair Queuing Algorithm for a Computational Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCN ![In: Distributed Computing and Networking, 10th International Conference, ICDCN 2009, Hyderabad, India, January 3-6, 2009. Proceedings, pp. 468-474, 2009, Springer, 978-3-540-92294-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Proportional share algorithms, Schedulers, Grid computing, Shares, Virtual Time |
28 | Hong-Hao Chen, Cheng-Chi Lee, Chih-Chiang Lee, Hsien-Chu Wu, Chwei-Shyong Tsai |
Multi-level visual secret sharing scheme with smooth-looking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS 2009), Seoul, Korea, 24-26 November 2009, pp. 155-160, 2009, ACM, 978-1-60558-710-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
code book, non-pixel expansion shares, visual cryptography, visual secret sharing |
28 | Mark Hartong, Rajni Goel, Duminda Wijesekera |
Protection and Recovery of Railroad Event Recorder Data. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIP Int. Conf. Digital Forensics ![In: Advances in Digital Forensics IV, Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30, 2008, pp. 247-260, 2008, Springer, 978-0-387-84926-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Event data recorders, railroad accident investigations, secret shares |
26 | Claudia Campolo, Antonio Iera, Leonardo Militano, Antonella Molinaro |
Dynamic bargaining of content shares in wireless cooperative systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PIMRC ![In: Proceedings of the IEEE 19th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2008, 15-18 September 2008, Cannes, French Riviera, France, pp. 1-5, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Wen-Guey Tzeng, Zhi-Jia Tzeng |
A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 35(1), pp. 47-61, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
revocation, broadcast encryption, traitor tracing |
26 | Filippo Neri |
Modeling Product Awareness Rates and Market Shares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RASTA ![In: Regulated Agent-Based Social Systems, First International Workshop, RASTA 2002, Bologna, Italy, July 16, 2002, Revised Selected and Invited Papers, pp. 134-144, 2002, Springer, 3-540-20923-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Wen-Guey Tzeng, Zhi-Jia Tzeng |
A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings, pp. 207-224, 2001, Springer, 3-540-41658-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
revocation, broadcast encryption, traitor tracing |
26 | Marco Carpentieri, Alfredo De Santis, Ugo Vaccaro |
Size of Shares and Probability of Cheating in Threshold Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings, pp. 118-125, 1993, Springer, 3-540-57600-2. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
26 | Renato M. Capocelli, Alfredo De Santis, Luisa Gargano, Ugo Vaccaro |
On the Size of Shares for Secret Sharing Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings, pp. 101-113, 1991, Springer, 3-540-55188-3. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
26 | K. V. Sastry |
Balancing processor shares of scheduling classes through controlled allocation of memory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFIPS National Computer Conference ![In: American Federation of Information Processing Societies: 1980 National Computer Conference, 19-22 May 1980, Anaheim, California, USA, pp. 453-456, 1980, AFIPS Press, 978-1-4503-7923-6. The full citation details ...](Pics/full.jpeg) |
1980 |
DBLP DOI BibTeX RDF |
|
23 | Foto N. Afrati, Jeffrey D. Ullman |
Optimizing joins in a map-reduce environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: EDBT 2010, 13th International Conference on Extending Database Technology, Lausanne, Switzerland, March 22-26, 2010, Proceedings, pp. 99-110, 2010, ACM, 978-1-60558-945-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
23 | Shangping Zhong, Xiangwen Liao, Xue Zhang, Jingqu Lin |
A Novel Distributed Single Sign-On Scheme with Dynamically Changed Threshold Value. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 563-566, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Güzin Ulutas, Vasif V. Nabiyev, Mustafa Ulutas |
Polynomial approach in a secret image sharing using quadratic residue. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCIS ![In: The 24th International Symposium on Computer and Information Sciences, ISCIS 2009, 14-16 September 2009, North Cyprus, pp. 586-591, 2009, IEEE. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Shaik Maleka, Amjed Shareef, C. Pandu Rangan |
The deterministic protocol for rational secret sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 22nd IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2008, Miami, Florida USA, April 14-18, 2008, pp. 1-7, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka |
A New (k, n)-Threshold Secret Sharing Scheme and Its Extension. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 455-470, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
threshold ramp scheme, entropy, random number, Secret sharing scheme, threshold scheme, ideal secret sharing scheme, exclusive-or |
23 | Robert Esposito, John Mountney, Li Bai, Dennis Silage |
Parallel Architecture Implementation of a Reliable (k, n) Image Sharing Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS ![In: 14th International Conference on Parallel and Distributed Systems, ICPADS 2008, Melbourne, Victoria, Australia, December 8-10, 2008, pp. 27-34, 2008, IEEE Computer Society, 978-0-7695-3434-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Chi-Ming Hu, Wen-Guey Tzeng |
Cheating Prevention in Visual Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Image Process. ![In: IEEE Trans. Image Process. 16(1), pp. 36-45, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Manghui Tu, Liangliang Xiao, Hui Ma 0006, I-Ling Yen, Farokh B. Bastani |
Placement in Dependable and Secure Peer-to-Peer Data Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), November 14-16, 2007, Dallas, Texas, USA, pp. 133-140, 2007, IEEE Computer Society, 0-7695-3043-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Amos Beimel, Matthew K. Franklin |
Weakly-Private Secret Sharing Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings, pp. 253-272, 2007, Springer, 3-540-70935-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Zhongmin Wang, Gonzalo R. Arce |
Halftone Visual Cryptography Through Error Diffusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: Proceedings of the International Conference on Image Processing, ICIP 2006, October 8-11, Atlanta, Georgia, USA, pp. 109-112, 2006, IEEE, 1-4244-0480-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Satoshi Obana, Toshinori Araki |
Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings, pp. 364-379, 2006, Springer, 3-540-49475-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Amir Houman Sadr, Shahrokh Ghaemmaghami |
A Collusion-Resistant Video Watermarking Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers, pp. 343-354, 2006, Springer, 978-3-540-74123-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin |
Updating the parameters of a threshold scheme by minimal broadcast. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 51(2), pp. 620-633, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Erik Elmroth, Peter Gardfjäll |
Design and Evaluation of a Decentralized System for Grid-wide Fairshare Scheduling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Science ![In: First International Conference on e-Science and Grid Technologies (e-Science 2005), 5-8 December 2005, Melbourne, Australia, pp. 221-229, 2005, IEEE Computer Society, 0-7695-2448-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Fengguang An, Xiuzhen Cheng 0001, Qing Xia, Fang Liu 0025, Liran Ma |
SeGrid: A Secure Grid Infrastructure for Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSN ![In: Mobile Ad-hoc and Sensor Networks, First International Conference, MSN 2005, Wuhan, China, December 13-15, 2005, Proceedings, pp. 422-432, 2005, Springer, 3-540-30856-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Blom’s key management scheme, secure grid infrastructure |
23 | Chin-Chen Chang 0001, Jun-Chou Chuang, Pei-Yu Lin |
Sharing a Secret Two-Tone Image in Two Gray-Level Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS (2) ![In: 11th International Conference on Parallel and Distributed Systems, ICPADS 2005, Fuduoka, Japan, July 20-22, 2005, pp. 300-304, 2005, IEEE Computer Society, 0-7695-2281-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
data encryption, visual cryptography, image hiding, Visual secret sharing |
23 | Seunglim Yong, Sang-Ho Lee |
An Efficient Fingerprinting Scheme with Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DRMTICS ![In: Digital Rights Management: Technologies, Issues, Challenges and Systems, First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005, Revised Selected Papers, pp. 192-202, 2005, Springer, 3-540-35998-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Gwo-Chin Tai, Long-Wen Chang |
Visual Cryptography for Digital Watermarking in Still Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PCM (2) ![In: Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30 - December 3, 2004, Proceedings, Part II, pp. 50-57, 2004, Springer, 3-540-23977-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
wavelet packet transform, digital watermarking, Visual cryptography |
23 | Josef Pieprzyk, Xian-Mo Zhang |
Constructions of Cheating Immune Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings, pp. 226-243, 2001, Springer, 3-540-43319-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
23 | Yvo Desmedt, Shuang Hou, Jean-Jacques Quisquater |
Audio and Optical Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings, pp. 392-404, 1998, Springer, 3-540-65109-8. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
23 | Wenbo Mao |
Guaranteed Correct Sharing of Integer Factorization with Off-Line Shareholders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, PKC '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings, pp. 60-71, 1998, Springer, 3-540-64693-0. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
23 | Ernest F. Brickell, Daniel M. Davenport |
On the Classification of Idea Secret Sharing Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings, pp. 278-285, 1989, Springer, 3-540-97317-6. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
19 | Asad Ali 0007, Kanza Ali |
Multiradio Parallel Offloading in Multiaccess Edge Computing: Optimizing Load Shares, Scheduling, and Capacity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 11(3), pp. 4047-4062, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Xi-Wen Wu, Tzung-Her Chen |
Security enhancement of an (n, n) threshold non-expansible XOR-based visual cryptography with unique meaningful shares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 83(10), pp. 28913-28926, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Zhihua Xia, Qi Gu, Wenhao Zhou, Lizhi Xiong, Jian Weng 0001, Naixue Xiong |
STR: Secure Computation on Additive Shares Using the Share-Transform-Reveal Strategy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 73(2), pp. 340-352, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Amirhossein Sajadi, Bri-Mathias S. Hodge |
Plane Wave Dynamic Model of Electric Power Networks with High Shares of Inverter-Based Resources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.16703, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Quinten Norga, Jan-Pieter D'Anvers, Suparna Kundu, Ingrid Verbauwhede |
Mask Conversions for d+1 shares in Hardware, with Application to Lattice-based PQC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2024, pp. 114, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
19 | Amirhossein Sajadi, Jo Ann Rañola, Rick Wallace Kenyon, Bri-Mathias S. Hodge, Barry Mather |
Dynamics and Stability of Power Systems With High Shares of Grid-Following Inverter-Based Resources: A Tutorial. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 29591-29613, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Peyman Rahmani, Seyed Mostafa Fakhrahmad, Mohammad Taheri |
Secure data outsourcing based on seed-residual shares and order-shuffling encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 79(9), pp. 10442-10480, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Amirhossein Sajadi, Bri-Mathias S. Hodge, Marc A. Carbone, Panagiotis N. Papadopoulos, Murali Baggu, Kenneth A. Loparo |
Introduction to the Special Section on Control and Management of Electric Power Systems With High Shares of Inverter-Based Resources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Syst. J. ![In: IEEE Syst. J. 17(4), pp. 5066-5069, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Yakov Babichenko, Michal Feldman, Ron Holzman, Vishnu V. Narayan |
Fair Division via Quantile Shares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2312.01874, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Michael Kölle 0001, Tim Matheis, Philipp Altmann, Kyrill Schmid |
Learning to Participate through Trading of Reward Shares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2301.07416, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Mojtaba Moradi-Sepahvand, Turaj Amraee |
Integrated Expansion Planning of Electric Energy Generation, Transmission, and Storage for Handling High Shares of Wind and Solar Power Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2310.05811, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Krishnaraj Bhat, Devesh Jinwala, Yamuna Prasad, Mukesh A. Zaveri |
Security Analysis of Visual based Share Authentication and Algorithms for Invalid Shares Generation in Malicious Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPMV ![In: Proceedings of the 5th International Conference on Image Processing and Machine Vision, IPMV 2023, Macau, SAR, China, January 13-15, 2023, pp. 86-92, 2023, ACM, 978-1-4503-9792-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Andrés F. Ocampo, Mah-Rukh Fida, Juan Felipe Botero, Ahmed Elmokashfi, Haakon Bryhni |
PRINCIPIA: Opportunistic CPU and CPU-shares Allocation for Containerized Virtualization in Mobile Edge Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: NOMS 2023, IEEE/IFIP Network Operations and Management Symposium, Miami, FL, USA, May 8-12, 2023, pp. 1-7, 2023, IEEE, 978-1-6654-7716-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Elliot Weiss, J. Christian Gerdes |
Follow My Lead: Designing an ADAS that Shares Decision Making and Control with the Driver. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC ![In: IEEE International Conference on Systems, Man, and Cybernetics, SMC 2023, Honolulu, Oahu, HI, USA, October 1-4, 2023, pp. 1482-1487, 2023, IEEE, 979-8-3503-3702-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Cristina Mihale-Wilson, Simon Hagen, Tobias Kohl, Henrik Kortum, Fabian Illgen, Jonas Rebstadt, Oliver Thomas, Oliver Hinz |
Introducing a methodological approach to determine value shares in Digital Ecosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirtschaftsinformatik ![In: Digital Responsibility: Social, Ethical, Ecological Implications of IS, 18. Internationale Tagung Wirtschaftsinformatik (WI 2023), September 18-21, 2023, Paderborn, Germany., pp. 82, 2023, AISeL. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
19 | Michael Kölle 0001, Tim Matheis, Philipp Altmann, Kyrill Schmid |
Learning to Participate Through Trading of Reward Shares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAART (1) ![In: Proceedings of the 15th International Conference on Agents and Artificial Intelligence, ICAART 2023, Volume 1, Lisbon, Portugal, February 22-24, 2023., pp. 355-362, 2023, SCITEPRESS, 978-989-758-623-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Fadhil I. Kurnia, Arun Venkataramani |
Oblivious Paxos: Privacy-Preserving Consensus Over Secret-Shares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SoCC ![In: Proceedings of the 2023 ACM Symposium on Cloud Computing, SoCC 2023, Santa Cruz, CA, USA, 30 October 2023 - 1 November 2023, pp. 65-80, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Sandor Simon, Markus Stroot, Andreas Ulbig |
Experimentally validated resonance instabilities in distribution grids with high inverter shares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISGT EUROPE ![In: IEEE PES Innovative Smart Grid Technologies Europe, ISGT EUROPE 2023, Grenoble, France, October 23-26, 2023, pp. 1-5, 2023, IEEE, 979-8-3503-9678-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Pawan Kumar Pathak, Anil Kumar Yadav, Sanjeevikumar Padmanaban, Innocent Kamwa |
Fractional Cascade LFC for Distributed Energy Sources via Advanced Optimization Technique Under High Renewable Shares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 92828-92842, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Rina Miyajima, Ryutaroh Matsumoto |
Advance Sharing of Quantum Shares for Classical Secrets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 94458-94468, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Hassan Haes Alhelou, Harish Parthasarathy, Neelu Nagpal, Vijyant Agarwal, Hardik Nagpal, Pierluigi Siano |
Decentralized Stochastic Disturbance Observer-Based Optimal Frequency Control Method for Interconnected Power Systems With High Renewable Shares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Ind. Informatics ![In: IEEE Trans. Ind. Informatics 18(5), pp. 3180-3192, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Mainejar Yadav, Ranvijay Singh |
Essential secret image sharing approach with same size of meaningful shares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 81(16), pp. 22677-22694, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Arup Kumar Chattopadhyay, Amitava Nag, Jyoti Prakash Singh |
An efficient verifiable (t, n)-threshold secret image sharing scheme with ultralight shares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 81(24), pp. 34969-34999, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Yongkang Zhao, Fang-Wei Fu 0001 |
A cheating immune (k, n) visual cryptography scheme by using the rotation of shares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 81(5), pp. 6235-6257, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Renwan Bi, Jinbo Xiong, Youliang Tian, Qi Li 0011, Ximeng Liu |
Edge-Cooperative Privacy-Preserving Object Detection Over Random Point Cloud Shares for Connected Autonomous Vehicles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Intell. Transp. Syst. ![In: IEEE Trans. Intell. Transp. Syst. 23(12), pp. 24979-24990, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Luca Schumann, Trinh Viet Doan, Tanya Shreedhar, Ricky K. P. Mok, Vaibhav Bajpai |
Impact of Evolving Protocols and COVID-19 on Internet Traffic Shares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2201.00142, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
19 | Moshe Babaioff, Uriel Feige |
Fair Shares: Feasibility, Domination and Incentives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2205.07519, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Rina Miyajima, Ryutaroh Matsumoto |
Advance sharing of quantum shares for classical secrets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2208.01847, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Vladislav Gennadievich Malyshkin, Mikhail Gennadievich Belov |
Market Directional Information Derived From (Time, Execution Price, Shares Traded) Sequence of Transactions. On The Impact From The Future. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2210.04223, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Maren Hein, Nils Goeken, Peter Kurz, Winfried J. Steiner |
Using Hierarchical Bayes draws for improving shares of choice predictions in conjoint simulations: A study based on conjoint choice data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Eur. J. Oper. Res. ![In: Eur. J. Oper. Res. 297(2), pp. 630-651, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Yi Wu, Delong Zhu, Zijian Liu, Xin Li |
An Improved BPNN Algorithm Based on Deep Learning Technology to Analyze the Market Risks of A+H Shares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Glob. Inf. Manag. ![In: J. Glob. Inf. Manag. 30(7), pp. 1-23, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Weijia Wang 0003, Chun Guo 0002, Yu Yu 0001, Fanjie Ji, Yang Su |
Side-Channel Masking with Common Shares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Trans. Cryptogr. Hardw. Embed. Syst. ![In: IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(3), pp. 290-329, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Matthieu Rambaud, Antoine Urban |
Asynchronous Dynamic Proactive Secret Sharing under Honest Majority: Refreshing Without a Consistent View on Shares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 619, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
19 | Shantanu Awasthi, Indranil Sengupta 0002, William Wilson, Prithviraj Lakkakula |
Machine learning and neural network based model predictions of soybean export shares from US Gulf to China. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Stat. Anal. Data Min. ![In: Stat. Anal. Data Min. 15(6), pp. 707-721, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Taghreed AlKhodaidi, Adnan Gutub |
Scalable shares generation to increase participants of counting-based secret sharing technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Comput. Secur. ![In: Int. J. Inf. Comput. Secur. 17(1/2), pp. 119-146, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Tarun Chitra, Guillermo Angeris, Alex Evans, Hsien-Tang Kao |
A Note On Borrowing Constant Function Market Maker Shares. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DeFi@CCS ![In: Proceedings of the 2022 ACM CCS Workshop on Decentralized Finance and Security, DeFi 2022, Los Angeles, CA, USA, 11 November 2022, pp. 55-61, 2022, ACM, 978-1-4503-9882-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Zhuo Sun, Tao Zhu |
Simulation Case Study: How Arctic Shipping Shares the Flow of Cargo from Traditional Routes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSC ![In: Winter Simulation Conference, WSC 2022, Singapore, December 11-14, 2022, pp. 1899-1910, 2022, IEEE, 978-1-6654-7661-4. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|